CVE-2025-12849
BaseFortify
Publication date: 2025-11-15
Last updated on: 2025-11-15
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | contest_gallery | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can allow unauthenticated attackers to inject arbitrary media attachments into your WordPress galleries and manipulate gallery metadata. This could lead to unauthorized content being displayed on your site, potentially damaging your site's integrity and user trust. However, attackers cannot move or upload files, limiting the scope of the impact.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Contest Gallery plugin to a version later than 28.0.2 where the authorization bypass issue is fixed. If an update is not available, consider disabling the plugin until a patch is released. Additionally, restrict access to the vulnerable AJAX action by implementing capability checks or nonce verification if you can modify the plugin code.
Can you explain this vulnerability to me?
The vulnerability in the Contest Gallery plugin for WordPress allows unauthorized users to bypass authorization checks because the plugin registers an AJAX action ('cg_check_wp_admin_upload_v10') for both authenticated and unauthenticated users without proper capability checks or nonce verification. This means attackers who are not logged in can inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata, although they cannot move or upload files.